Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CMMC-CCA Exam Dumps - Cyber AB CMMC Questions and Answers

Question # 24

The OSC has assembled its documentation relating to how it controls remote access for assessment. The Lead Assessor compared this documentation to the provided topology map and noted several indications of external connections with External Service Providers (ESPs). Which document is MOST LIKELY to show acceptable evidence of the security controls related to the interface between the OSC and the ESP?

Options:

A.

OSC’s access control policy

B.

Interconnection agreement with ESPs

C.

Technical design of the security of the available VPN

D.

Instructions provided to the OSC from the ESP to implement remote access

Buy Now
Question # 25

A C3PAO has contracted by an OSC to perform its assessment. Before the assessment, the Lead Assessor asks the OSC to provide an extensive list of evidence, some of which is optional and beyond the minimum requirements. The OSC is not able to fulfill the entire request. One missing document was a current and organized list of the OSC’s evidence and mappings.

Given that this is a Level 2 Assessment, what should the Lead Assessor tell the OSC?

Options:

A.

“The OSC’s Assessment Official will be asked to collect evidence when requested by the assessment team.”

B.

“The OSC must provide the Assessment Team with hardcopy evidence. Electronic evidence will only be collected when needed.”

C.

“It’s okay that the document is missing. The Assessment Team will collect all evidence themselves to ensure its integrity.”

D.

“The OSC should provide the Assessment Team with a current and organized list of their evidence and process mappings, but the assessment can continue.”

Buy Now
Question # 26

Which of the following can be taken into consideration when assessing AC.L2-3.1.3 Privacy & Security Notices?

Options:

A.

System use notifications during system log-in

B.

Alerts received from Intrusion Detection and Protection devices

C.

Posters in the workplace warning of the dangers of phishing and shoulder-surfing

D.

Sending out notices in email reminding employees to be conscious of security concerns

Buy Now
Question # 27

The OSC has not implemented cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission, citing the use of alternative physical safeguards.

Which of the following is NOT an alternative physical safeguard in this scenario?

Options:

A.

Trusted couriers

B.

Lockable casings

C.

Physical access site monitoring

D.

Tamper protections technologies

Buy Now
Question # 28

An OSC seeking Level 2 certification has recently configured system auditing capabilities for all systems within the assessment scope. The audit logs are generated based on the required events and contain the correct content that the organization has defined.

Which of the following BEST describes the next system auditing objective that the organization should define?

Options:

A.

Centralized audit log collection

B.

Integration of all system audit logs

C.

Review and update of logged events

D.

Retention requirements for audit records

Buy Now
Question # 29

A company seeking Level 2 certification has several telecommunications closets throughout its office building. The closets contain network systems and devices that are used to transmit CUI. Which method would be BEST to ensure that only authorized personnel can access the network systems and devices housed within the closets?

Options:

A.

Label the door with “Authorized Personnel Only” and maintain an authorized personnel list.

B.

Install locks with badge readers on the closet doors and maintain an authorized list.

C.

Install security cameras to monitor closet entrances and maintain an authorized personnel list.

D.

Install keypad door locks on the closet doors and only provide the code to IT department personnel.

Buy Now
Question # 30

A company has five individual buildings in one business complex. During the assessment, the Assessment Team sees people entering and exiting the buildings and notices that none of the buildings have keypads or locks. The Assessment Team needs to determine how physical access is managed and controlled.

Which artifact BEST describes how access to these buildings is managed?

Options:

A.

System Security Plan (SSP)

B.

Personnel Access List

C.

Identification and Authorization Plan

D.

Physical and Environmental Protection Policy

Buy Now
Question # 31

To meet AC.L2-3.1.5: Least Privilege, the following procedure is established:

    All employees are given a basic (non-privileged) user account.

    System Administrators are given a separate System Administrator account.

    Database Administrators are given a separate Database Administrator account.

Which steps should be added to BEST meet all of the standards for least privilege?

Options:

A.

4. Database Administrators use their Database Administrator accounts to perform privileged functions.

  5. All users use their basic account for non-privileged functions.

B.

4. Database Administrators use their Database Administrator accounts to perform privileged functions.

  5. Non-privileged users use their basic account for non-privileged functions.

C.

4. Database Administrators use the System Administrator accounts to perform privileged functions.

  5. All other users use their basic account for all authorized functions.

D.

4. Database Administrators use the System Administrator accounts to perform privileged functions.

  5. Non-privileged users use their basic account for all authorized functions.

Buy Now
Question # 32

An OSC leases several servers and rack space in a FedRAMP MODERATE authorized colocation data center. Additional servers operate in a LAN room within the company’s facility. Both facilities are within the OSC’s assessment boundary. In order to assess the physical protection of the environment, the Assessor MUST physically examine the visitor and access controls in place in the:

Options:

A.

Data center

B.

OSC’s facility

C.

OSC’s facility and the data center

D.

OSC’s facility and the data center’s customer relationship management regarding physical security

Buy Now
Question # 33

While conducting a CMMC Level 2 Assessment for a small waveguide manufacturer, the client provides a copy of their CMMC Level 1 Self-Assessment that their senior official has recently approved and uploaded to the Supplier Performance Risk System (SPRS). What type of information may be covered within the Level 1 Self-Assessment that is OUTSIDE the scope of a Level 2 assessment?

Options:

A.

CUI in paper format

B.

FCI within the CUI production enclave

C.

FCI data within the description in the contractor self-assessment

D.

Sensitive Compartmented Information (SCI) shredded by an approved vendor

Buy Now
Exam Code: CMMC-CCA
Exam Name: Certified CMMC Assessor (CCA) Exam
Last Update: Sep 3, 2025
Questions: 150
CMMC-CCA pdf

CMMC-CCA PDF

$29.75  $84.99
CMMC-CCA Engine

CMMC-CCA Testing Engine

$33.25  $94.99
CMMC-CCA PDF + Engine

CMMC-CCA PDF + Testing Engine

$47.25  $134.99